期刊文献+

基于NTRU格的云数据可撤销属性基加密方案 被引量:5

Revocable attribute-based encryption based on NTRU lattices for cloud data
下载PDF
导出
摘要 针对现有基于离散对数求解难题的云数据加密方案无法抵御量子计算攻击并同时实现安全有效的属性撤销问题,提出一种基于NTRU格的云数据可撤销密文策略属性基加密方案RNL-ABE.首先将基于NTRU格的加密算法与属性基加密结合以抵御量子计算攻击,实现细粒度访问控制和安全属性撤销,避免重新进行密钥分发;改进密钥结构,防止系统中的合法用户、撤销用户、外部攻击者之间实施共谋攻击.最后基于环上误差学习难题(R-LWE),对RNL-ABE方案进行了形式化证明,并与同类型方案进行了仿真性能比较.结果表明:RNL-ABE方案在选择属性集模型下能够抵御量子计算攻击并实现安全的属性撤销;相比其他同类型方案,所提出方案在效率上更具有优势,计算和通信开销均减少50%以上. Aiming at the problem that the existing cloud data encryption schemes based on discrete logarithm solution were unable to resist quantum computing attacks and realize secure and effective attribute revocation at the same time,a new revocable ciphertext-policy attribute-based encryption(CP-ABE)scheme based on number theory research unit(NTRU)lattices for cloud data,called the RNL-ABE,was proposed.First,an encryption algorithm based on NTRU lattices was combined with attribute-based encryption to resist quantum computing attacks.And the fine-grained access control and the security attribute revocation were realized to avoid key re-distribution.Collusion attacks among legal users,revoked users and online intruders were defended by improving key structure.Finally,the RNL-ABE scheme was formally proved based on the learning with error problem over ring(R-LWE),and the simulation performances were compared with those of similar schemes.The results show that the RNL-ABE scheme can resist the quantum computing attacks and realize secure attribute revocation on the selective-set model.Compared with other similar schemes,the proposed scheme has more advantages in the efficiency,and the computing cost and communication cost are reduced by more than 50%.
作者 江健豪 蒋睿 裴蓓 吴松洋 Jiang Jianhao;Jiang Rui;Pei Bei;Wu Songyang(School of Cyber Science and Engineering,Southeast University,Nanjing 210096,China;Key Lab of Information Network Security,Ministry of Public Security,Shanghai 200031,China)
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2020年第6期1052-1061,共10页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(61372103) 江苏省自然科学基金资助项目(BK20201265) 信息网络安全公安部重点实验室开放课题资助项目(C19607) 江苏省计算机网络技术重点实验室资助项目.
关键词 属性基加密 抗量子计算攻击 NTRU格 环上误差学习 属性撤销 attribute-based encryption(ABE) anti-quantum computing attacks number theory research unit(NTRU)lattices learning with error problem over rings(R-LWE) attribute revocation
  • 相关文献

参考文献2

二级参考文献19

  • 1Goyal V, Pandey O, Sahai A, et al. Attrlbute-Based Encryption for Fine-Grained Access Control of En- crypted Data[C]//Proeeedings of The 13th ACM Conference on Computer and Communications Securi- ty. ACM, 2006: 89-98.
  • 2Sahai A, Seyalioglu H, Waters B. Dynamic Creden- tials and Ciphertext Delegation for Attribute-Based gncryption 2J ]. Advances in Cryptology - CRYPTO 2012, 2012: 199-217.
  • 3Agrawal S, Boyen X, Vaikuntanathan V, et al. Func- tional Encryption for Threshold Functions (Or Fuzzy Ibe) from Lattices[M3//~-s.n.3.Public Key Cryptography -PKC 2012. Berlin Heidelberg: Springer,2012 : 280-297.
  • 4Zhang J, Zhang Z, Ge A. CiphertextPolicy Attribute- Based Encryption from Lattices[C3//Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM, 2012: 16-17.
  • 5Gorbunov S, Vaikuntanathan V, Wee H. Attribute- Based Encryption for Circuitsl-C~//Proceedings of the 45th Annual ACM Symposium on Symposium on Theory of Computing. ACM, 2013: 545-554.
  • 6Wang Y. Lattice Ciphertext Policy Attribute-based Eneryption in the Standard Model[J3.IJ Network Se- curity, 2014, 16(4): 358-365.
  • 7Chen J, Lim H W, Ling S, et al. RevocableIdentity- Based Encryption from Lattices[C~//Information Se- curity and Privacy. Springer Berlin Heidelberg, 2012: 390-403.
  • 8Micciancio D, Regev O. Worst-case toAverage-Case Reductions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 37(1) : 267-302.
  • 9Gentry C, Peikert C, Vaikuntanathan V. Trapdoors forHard Lattices and New Cryptographic Construc- tions[C~// Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing. ACM, 2008: 197-206.
  • 10Agrawal S, Boneh D, Boyen X. Efficient Iattiee (H) IBE in the Standard Model[C~//Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Springer- Verlag, 2010: 553-572.

共引文献5

同被引文献59

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部